Bayesian game based pseudo honeypot model in social networks

8Citations
Citations of this article
9Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper, we study applying honeypots to protect social networks against DDoS attacks. Different from previous works that study honeypots for DDoS attacks, we consider attackers are rational and know to optimize attacking strategies based on the defender’s strategy. To deal with such strategic attackers, we propose a novel pseudo honeypot game model following the Bayesian game setting. In addition, we rigorously prove the existence of Bayesian Nash equilibriums (BNEs) and show how to find them in all different cases. Simulations show the BNEs achieved in the games not only reduce energy consumption but also improve efficiency of the defense.

Cite

CITATION STYLE

APA

Du, M., Li, Y., Lu, Q., & Wang, K. (2017). Bayesian game based pseudo honeypot model in social networks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10603 LNCS, pp. 62–71). Springer Verlag. https://doi.org/10.1007/978-3-319-68542-7_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free